Question

Which data monitoring method do the steps below BEST describe?

Keep a user log to document everyone that handles each piece of sensitive data.
Monitor the system in real time.
answer

File monitoring


DNS monitoring


DGA monitoroing


URL monitoring

Answers

GPT-5 mini
File monitoring.

Reason: keeping user logs of who accesses/handles sensitive data and monitoring those events in real time are classic file access/audit and file integrity monitoring activities.

Related Questions